
Vector 35
@vector35
Makers of the Binary Ninja - Reverse Engineering Platform. binary.ninja/twitter
Also posting at infosec.exchange/@binaryninja
ID: 2957422323
https://vector35.com/ 02-01-2015 22:40:24
2,2K Tweet
9,9K Followers
1,1K Following

Jordan Wiens
@psifertex
Worst developer among many good ones making binary.ninja Posting over on bsky.app/profile/psifer… as well.
Forrester
@forrester
Forrester helps business and technology leaders use customer obsession to accelerate growth. With us, you can be bold at work.
Justin Elze
@hackinglz
CTO @TrustedSec | Former Optiv/SecureWorks/Accuvant Labs/Redspin | Race cars
Gartner
@gartner_inc
We deliver actionable, objective insight that drives smarter decisions and stronger performance. #GartnerNewsroom Community guidelines: gtnr.it/3tceMrU
Halvar Flake
@halvarflake
Choose disfavour where obedience does not bring honour. I do math. And was once asked by R. Morris Sr. : "For whom?" @[email protected]
Binni Shah
@binitamshah
Linux Evangelist, Malwares, Security enthusiast , Investor, Contrarian , Philanthropist , Reformist , Sigma female 🦋 binitamshah.bsky.social
Ange
@angealbertini
Reverse engineer, file formats expert. Corkami, CPS2Shock, PoC||GTFO, Sha1tered, Magika... Security engineer @ Google. He/him.
Securelist
@securelist
The resource for Kaspersky experts' technical research, analysis, and thoughts.
dmnk.bsky.social
@domenuk
【DΞCOMPILΞ NΣVΞR】 Android Red Team @google Fuzzing @aflplusplus CTF @enoflag (opinions my own)
blasty
@bl4sty
irresponsible disclosure aficionado
Ptrace Security GmbH
@ptracesecurity
Empowering IT Security Professionals through Hands-On Online Courses.
lcamtuf
@lcamtuf
Substack: lcamtuf.substack.com/archive Homepage: lcamtuf.coredump.cx
Ryan Smith
@hustlelabs
Henceforth, it is the map that precedes the territory. If we were to revive the fable, it would be the territory whose shreds are rotting across the map.abhijit mohanta
@abhijit_mohanta
Author: "Malware Analysis and Detection Engineering" and "Preventing Ransomware" . Malware Researcher
Alexandre Borges
@ale_sp_brazil
Vulnerability Researcher and Exploit Developer (b. sky: alexandreborges)
Ilfak Guilfanov
@ilfak
The author of IDA Pro and Hex-Rays Decompiler
Chris Eagle
@sk3wl

Trend Zero Day Initiative
@thezdi
Trend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
Internet Molaba 💻
@internetmolaba
Así comenzó Internet. Hilos y capturas retro. We ❤️ cosas interneteras antiguas & emojis 😉😍🙄 ¿Nos pagas un ☕? ko-fi.com/internetmolaba
[email protected]
@christogrozev
Investigative journalist (Spiegel, The Insider, ex-Bellingcat), film maker and hobby coder. youtube.com/@thechristofil…
stypr
@brokenpacifist
Touring sourcecodes @dfsec_com RT/Like bot す
d4nny
@edb88320h
Reverse Engineer
Filippo Roncari
@f_roncari
Curious guy with a long-time passion for zero-days. CTO @prdgmshift, *OS security research. Prev: research director @■, co-founder and researcher @truel_it.
Can Bölük
@_can1357
Security researcher and reverse engineer. Interested in Windows kernel development, low-level programming, static program analysis and cryptography.
Sinaei
@intel80x86
Windows Internals enthusiast, Interested in hardware design & low-level programming. An active developer of @HyperDbg debugger. github.com/SinaKarvandi
Swissky
@pentest_swissky
RedTeam | Pentest Author of PayloadsAllTheThings & SSRFmap github.com/swisskyrepo
Francesco Muroni
@framauronz
Computer Engineer, IT sec enthusiast, aspiring malware researcher
Samir
@sbousseaden
Detection Engineering | Elastic Security Mastodon: @[email protected]
hasherezade
@hasherezade
Programmer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
Matteo
@fvrmatteo
Reversing & Coding
CODE BLUE
@codeblue_jp
International Security Conference in Tokyo HP codeblue.jp FB on.fb.me/1HHGhwU SL bit.ly/1Ju6osj MV bit.ly/1BSX66n
LiveOverflow 🔴
@liveoverflow
wannabe hacker... he/him 🌱 grow your hacking skills @hextreeio
CSA
@csasingapore
The official Twitter account of the Cyber Security Agency of Singapore 🇸🇬
Igor Skochinsky (@[email protected])
@igorskochinsky
software developer at Hex-Rays*, hobby reverse engineer. Advanced cleartext hacker. 日本語おk *For Hex-Rays support/inquiries: hex-rays.com/contact
Bug Bounty Reports Explained
@gregxsunday
Grzegorz Niedziela - a hacker who documents his hacking journey by creating and curating the best content about bug bounty and offensive security.
b1ack0wl
@b1ack0wl
0day Researcher @ ████████████ / Baker / 0wl
Jiří Vinopal
@vinopaljiri
Threat Researcher at Check Point @_CPResearch_ #DFIR #Reversing - All opinions expressed here are mine only. youtube.com/c/DuMpGuYTrIcK…
strellic
@strellic_
ctf @cor_ctf @dicegangctf @ProjectSEKAIctf grad @Berkeley_EECS '23 ❤️ rhythm games, web/app security @zellic_io
P4nda
@p4nda20371774
Security researcher | PWN | Learning Browser security Cola enthusiast Tweets are my own
rthhh
@rthhh17
Hyper-V Security Researcher. Black Hat USA 2021/2022 Speaker. MSRC MVR 2019/2020/2022/2024.
Dohyun Lee
@l33d0hyun
Intended Ph.D. Student @ USELab / ai
Zion Leonahenahe Basque
@mahal0z
Native Hawaiian Hacker | Prev Co-captain of @Shellphish | PhD Student in Comp Sci @ASU l Decompiler Research | Mastodon: @[email protected]
stacksmashing
@ghidraninja
Security researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of @hextreeio. Contact: [email protected]
GLIMPS
@glimpsre
Uncover your malwares in a GLIMPSe of an eye! Winner of the ECW2019 & 2020 Startup Trophy, @ecso_eu and @ACN_SecNum Certified !
cts🌸
@gf_256
Co-founder and hacker @zellic_io & @pb_ctf | youtube.co/basteg0d69 | 24 Intern @egirl_capital slow to reply to DMs
vx-underground
@vxunderground
The largest collection of malware source code, samples, and papers on the internet. Password: infected
chompie
@chompie1337
hacker, weird machine mechanic, exploit dev @xforce
OSINTtechnical
@osinttechnical
PAI enjoyer, OSINT guy @hntrbrkmedia, my views/freezing cold takes are my own. For full disclosures, visit hntrbrk.com.
Anoop Saldanha
@anoopsaldanha
Author-Malware Analysis and Detection Engineering | Suricata IDS/IPS Core-Developer | Cybersecurity, IoT Security/Fingerprinting | Forensics | Open Source Devel
Kalmarunionen
@kalmarunionendm
KalmarCTF 2025: kalmarc.tf Homepage: kalmarunionen.dk CTFtime Link: ctftime.org/team/114856
Interrupt Labs
@interruptlabs
We’re here to provide world-leading vulnerability research and research capabilities. From browsers, mobile, automotive and everything in between.
thehackerscrew
@thehackerscrew1
The hackers that screw International CTF team Recruiting : rb.gy/mmn04a
allthingsida
@allthingsida
All things IDA, security, reverse engineering, programming, AI and more. Friend and fan of Hex-Rays but non-official.
Kwasi Boateng
@cyberrootkb
Experte für Cybersicherheit und Musikliebhaber. 🎵 Immer am Lernen, immer am Wachsen. Stolz auf meine Wurzeln 🇳🇬🇳🇬🇳🇬
Claudia d’Antoine
@secretgardenctf
Security @margin_research
V35 Foz
@vector35foz

RE//verse
@reverseconf
A conference for all things in the reverse engineering universe... re-verse.io
Solcu Gazete
@solcugazetex
@solcugazete yedek hesabıdır. Ana hesabın kullanılamadığı durumlarda paylaşımlar buradan yapılır. YEDEK HESAP: @solcugazete60 [email protected]
reverseame
@reverseame
RME-DisCo research group from University of Zaragoza. Special interest on software and systems security. Link to our Telegram channel: t.me/reverseame
ippsec
@ippsec

Niklas B
@_niklasb
research @dfsec_com - @[email protected]
offensivecon
@offensive_con
OffensiveCon is a highly technical international security conference focused on offensive security only. 12-17th of May. Organized by @Binary_Gecko.
maxpl0it
@maxpl0it
Principal Vulnerability Researcher at @InterruptLabs. Occasional Pwn2Owner
Corellium
@corelliumhq
Mobile and IoT device virtualization on Arm. On-site and in the cloud. To sign up or learn more, visit us at corellium.com
TyphoonCon🌪️
@typhooncon
TyphoonCon is an annual all Offensive Security Conference, taking place May 26-30, 2025 in Seoul, South Korea 🌪️
Blackhoodie
@blackhoodie_re
Blackhoodie is a free, women-only reverse engineering workshop. Check our website for infos! #BHRE
Yarden Shafir
@yarden_shafir
A circus artist with a visual studio license
SheHacks KE #SheHacks2025
@shehacks_ke
A community of women cyber warriors founded & led by women, looking to bridge the skills and gender gap in #InfoSec in Kenya. 👩🏻💻 📧[email protected]